Action not permitted
Modal body text goes here.
ghsa-653m-wpjp-54c4
Vulnerability from github
Published
2022-06-04 00:00
Modified
2022-06-15 00:00
Severity
Details
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
{ "affected": [], "aliases": [ "CVE-2022-26134" ], "database_specific": { "cwe_ids": [ "CWE-74" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-06-03T22:15:00Z", "severity": "CRITICAL" }, "details": "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.", "id": "GHSA-653m-wpjp-54c4", "modified": "2022-06-15T00:00:24Z", "published": "2022-06-04T00:00:25Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26134" }, { "type": "WEB", "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html" }, { "type": "WEB", "url": "https://jira.atlassian.com/browse/CONFSERVER-79016" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
cve-2022-26134
Vulnerability from cvelistv5
Published
2022-06-03 21:51
Modified
2024-09-16 18:55
Severity
Summary
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
References
Impacted products
Vendor | Product |
---|---|
Atlassian | Confluence Data Center |
Atlassian | Confluence Server |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79016" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Confluence Data Center", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "next of 1.3.0", "versionType": "custom" }, { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.13.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.18.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Confluence Server", "vendor": "Atlassian", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "next of 1.3.0", "versionType": "custom" }, { "lessThan": "7.4.17", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.13.0", "versionType": "custom" }, { "lessThan": "7.13.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.14.0", "versionType": "custom" }, { "lessThan": "7.14.3", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.15.0", "versionType": "custom" }, { "lessThan": "7.15.2", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.16.0", "versionType": "custom" }, { "lessThan": "7.16.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.17.0", "versionType": "custom" }, { "lessThan": "7.17.4", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "7.18.0", "versionType": "custom" }, { "lessThan": "7.18.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-30T05:20:13", "orgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "shortName": "atlassian" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jira.atlassian.com/browse/CONFSERVER-79016" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@atlassian.com", "DATE_PUBLIC": "2022-05-31T20:00:00", "ID": "CVE-2022-26134", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Confluence Data Center", "version": { "version_data": [ { "version_affected": "\u003e", "version_value": "1.3.0" }, { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.13.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.18.1" } ] } }, { "product_name": "Confluence Server", "version": { "version_data": [ { "version_affected": "\u003e", "version_value": "1.3.0" }, { "version_affected": "\u003c", "version_value": "7.4.17" }, { "version_affected": "\u003e=", "version_value": "7.13.0" }, { "version_affected": "\u003c", "version_value": "7.13.7" }, { "version_affected": "\u003e=", "version_value": "7.14.0" }, { "version_affected": "\u003c", "version_value": "7.14.3" }, { "version_affected": "\u003e=", "version_value": "7.15.0" }, { "version_affected": "\u003c", "version_value": "7.15.2" }, { "version_affected": "\u003e=", "version_value": "7.16.0" }, { "version_affected": "\u003c", "version_value": "7.16.4" }, { "version_affected": "\u003e=", "version_value": "7.17.0" }, { "version_affected": "\u003c", "version_value": "7.17.4" }, { "version_affected": "\u003e=", "version_value": "7.18.0" }, { "version_affected": "\u003c", "version_value": "7.18.1" } ] } } ] }, "vendor_name": "Atlassian" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://jira.atlassian.com/browse/CONFSERVER-79016", "refsource": "MISC", "url": "https://jira.atlassian.com/browse/CONFSERVER-79016" }, { "name": "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/167432/Confluence-OGNL-Injection-Proof-Of-Concept.html" }, { "name": "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/167430/Confluence-OGNL-Injection-Remote-Code-Execution.html" }, { "name": "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/167431/Through-The-Wire-CVE-2022-26134-Confluence-Proof-Of-Concept.html" }, { "name": "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/167449/Atlassian-Confluence-Namespace-OGNL-Injection.html" }, { "name": "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html", "refsource": "MISC", "url": "https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f08a6ab8-ed46-4c22-8884-d911ccfe3c66", "assignerShortName": "atlassian", "cveId": "CVE-2022-26134", "datePublished": "2022-06-03T21:51:57.134389Z", "dateReserved": "2022-02-25T00:00:00", "dateUpdated": "2024-09-16T18:55:17.016Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading...